-- By EdenEsemuede - 1 February 2024
With that in mind, I find it pertinent to discuss a history of protest, adding an understanding of how getting people together worked before we had the internet to do it for us. Then, I will discuss how modern conventions, such as the internet and cell phones, are used for tracking purposes. Finally, I will make an argument for a compromise that maximizes the accessibility of the Internet and the anonymity of private communication.
In the modern age, protest organization works differently. An organizer for a small protest may post in a group chat of like-minded individuals. Larger protests may start with an Instagram page or website. However, the IP addresses of people who access sites like these can be found and potentially turned over to local and federal law enforcement. Evidence on how unsafe this information is is mixed. In 2017, the Department of Justice served a website with a search warrant, asking for the IP address of disruptj20.org visitors after protesting Trump’s inauguration. Similarly, Customs and Border Protection ordered Twitter to hand over the phone number, mailing, and IP addresses associated with Trump dissenters @ALT_USCIS, which was only dropped after a lawsuit from Twitter. (Guardian) However, that leaves organizers at the mercy of the platform. With this in mind, organizers must consider different ways of getting information out to potential protest partners.
Concerns for the average, non-organizing protestor are different from that of organizers. Utica Police Department spokesman Lt. Bryan Coromato says that while social media makes it easy for police officers to see what will happen at a peaceful protest, the department isn’t “sitting around with certain people's names or certain group's names and observing their posts or their profiles on whatever social media sites just to see what they're doing.” (Govtech). However, they certainly can do so, considering their contracts with companies like Cellbrite, who can download all information stored in a phone, alongside contracts with companies like Gofeedia and Media Sonar, which extract private information from Twitter, Facebook, and Instagram. (Cityrecord, nysfocus).
As expected, the legality of these actions is always in question. Adjudication around police in the protest sphere tends to focus on what they can access once someone is in custody. One can combat this by putting a 6+ digit passcode on your phone before you go to a protest, so police can’t force you to unlock it immediately, and wearing a mask with reflective sunglasses to avoid facial recognition software. While rules against self-incrimination exist for simply accessing the phone from your end, police seemingly have endless power to get search warrants for the information posted over the internet, whether from a website or a supposedly ”private” Facebook messenger chat. (Vice). Time and time again, the broad wish to survey protestor actions has passed the loose requirements of probable cause, and until new legislation passes to limit it, these searches will only get more invasive.
With all of the dangers in mind, it might be tempting to suggest that we go back to the protesting methods of old. After all, if the March on Washington managed to get 250,000 people together without a single Instagram post, it could potentially happen again. However, the internet is only so dangerous for privacy because activists lack information on how to connect with one another in private.
Protest organizers should plan as little of their activity as possible in unencrypted forums. While a website may serve as a good digital flyer, more specific aspects of protests, such as planned speakers, planned attendees, series of events, and public disruption should always be kept private. Protestors, in turn, should protect themselves through the use of true VPNs and social media accounts not connected to their real-world personas. By doing so, individuals advocating for change can maximize both visibility and safety through the use of the internet. Until the law changes, this will have to be a protest organizer’s new norm.
Others: (Science Direct) https://www.sciencedirect.com/science/article/pii/S016762452200021X#:~:text=We%20find%20robust%20evidence%20that,and%20political%20structures%20of%20societies.
(The Intercept) https://theintercept.com/2024/01/22/columbia-university-palestine-protest-skunk/
(March on Washington) https://www.crmvet.org/tim/tim63b.htm#1963mow
(Cityrecord) https://a856-cityrecord.nyc.gov/RequestDetail/20230309019
https://web.archive.org/web/20170110224042/http://www.disruptj20.org/
https://www.theverge.com/2017/9/12/16298192/apple-iphone-face-id-legal-security-fifth-amendment
https://www.acludc.org/en/how-defend-against-police-surveillance-protests